Search Results

Abstract:
This special report is prepared for the North American Forum (NAF). In 2015, CIGI’s Global Security & Politics Program became the Secretariat for the Canadian leadership within the NAF. CIGI will be undertaking a program of research to support the Canadian contribution to the NAF in cooperation with our American and Mexican partners. In the coming months, CIGI will publish additional reports to support the work of the NAF. Since the 1994 North American Free Trade Agreement, trade, investment and migration flows among Canada, Mexico and the United States have helped turn North America into one of the most dynamic and prosperous trade blocs on the planet. With a new government in Ottawa, it is an ideal time for Canada to make a stronger, deeper relationship with Mexico a crucial plank of a plan to secure a prosperous future for North America. Better relations between Mexico and Canada not only means more opportunities to take advantage of the two countries’ economic and social complementarities, it also gives the two countries the opportunity to closely work together to get the United States on board with an ambitious North American agenda to secure the continent’s economic future.

Abstract:
Although the January 2016 Sarinah mall attacks in Jakarta demonstrate the need for continued vigilance, this paper argues that Islamic extremism and fundamentalism are not on the rise in Indonesia. In fact, Islamic extremism in Indonesia reached its height in the early 2000s, with radicalized groups participating in religious conflicts in Eastern Indonesia and carrying out large-scale terrorist attacks, such as the bombings in Bali in 2002. Since then, the capacity of the security apparatus has markedly improved, leading to the crippling of terrorist networks. Today, the majority of Islamists engage in above-ground non-violent activities and pose little threat to the country’s stability. This paper views fundamentalism and extremism as symptoms of broader problems in Indonesia, and argues that addressing these issues should help to further reduce the problems of religious fundamentalism and extremism.

Abstract:
Until recently, Southeast Asia had not been a region of sustained focus for the US-Japan relationship. But the situation is changing. The international relations of the Asia-Pacific is becoming more "multipolarized." This requires the US and Japan to think about the future of the region beyond the issue of US-China relations, which has preoccupied past discussions. A number of nations and institutions in the Asia-Pacific region will substantially affect the region's future. Southeast Asian nations and the Association of Southeast Asian Nations (ASEAN) are among them. A new era of more coordinated, sustained, and combined commercial and security involvement by the US and Japan in Southeast Asia may be at hand. In light of these changes, the East-West Center in Washington (EWCW), in collaboration with the Japan Institute of International Affairs (JIIA), and through the support of the Sasakawa Peace Foundation (SPF), initiated a dialogue with Southeast Asians about their perspectives on how the US-Japan relationship and alliance could or should approach cooperation with the region.

Abstract:
The Forces Démocratiques de Libération du Rwanda (Democratic Forces for the Liberation of Rwanda, FDLR)—including its armed wing, the Forces Combattantes Abacunguzi (Abacunguzi Fighting Forces, FOCA)1—is among the most enduring armed groups in the eastern Democratic Republic of the Congo (DRC). Several members of the group’s top leadership are suspected of involvement in the 1994 Rwandan genocide, making the FDLR’s continued presence in the DRC a recurring point of contention between Kinshasa and Kigali and a source of tensions for the Great Lakes region as a whole (Omaar, 2008, pp. 65– 66, 236–312). Maj. Gen. Sylvestre Mudacumura, the group’s military commander, is wanted by the International Criminal Court for war crimes committed in the DRC itself (ICC, 2012). The group’s presence has also led to the emer- gence of local armed groups that claim to protect communities, further complicating security dynamics in the eastern DRC (Debelle and Florquin, 2015, p. 206).

Abstract:
A change in the Baltic Sea regional security situation has already taken place and is having direct and indirect impacts on the countries in the region. Potential risks to stability in the Baltic Sea Region have been activated, although they are not yet, and hopefully never will be actualized in the form of open military conflict. Russia’s self-perception as a target of Western aggression is a way to legitimize assertive foreign
policy towards the West in general and to continue military posturing in the Baltic Sea Region, where both the risks and possible gains for Russia are the greatest. Considering the full-spectrum approach to conflict and the web of relationships that exists throughout the Baltic Sea Region, it is possible to conclude that beyond a certain point, all Baltic Sea littoral states will not only be impacted but drawn into a conflict occurring in the region.

Abstract:
State concerns about crime and security issues have strongly affected conceptions of economic action outside the law, a traditional field of research in sociology. This increasing encroachment by policy-related concerns on the intellectual framework of the discipline has led, on one hand, to an almost exclusive focus on criminal organizations in the analyses of illegal economic activity. On the other hand, it has led to the downplaying of the importance of classic topics of sociological reflection, such as the embeddedness of action, the moral dimension of illegal products, or the relationship between social change and the spread of illegal exchanges. This short paper problematizes economic action outside the law by taking legal definitions and their effects seriously. It begins with the problem of naturalizing state definitions. This is followed by a discussion of the illegality of illegal markets, which illustrates sociological contributions. Finally, three dimensions of the study of illegal markets are suggested. Overall, the paper lays out a research program for this field of sociological inquiry.

Abstract:
The Afghanistan of today would surprise most outsiders, even those who closely follow developments in the country. We are often wrongly branded as a failing state with a struggling government whose young people are fleeing en masse for Europe and whose military has lost control of the security situation. While anecdotal evidence can always be found to lend isolated support to such claims, this sweeping characterization offers a distorted picture of reality.

Abstract:
The existence of a police component in UN peace operations is not a novelty. It goes back half a century ago and was first introduced in the Congo in the 1960’s. Embedding police components in UN missions became more extensive at the end of the 90’s.
Over the years, with the change of the context of conflicts (from interstate to intrastate) peace support operations have evolved and are now very much shaped to reflect political and security developments on the ground.
International policing efforts are an extremely important factor in establishing and maintaining international security today. Although military peace support operations and national military contributions are predominant, not all security problems can have a military solution. Regardless of the security context, police functions and mechanisms are extremely necessary for a successful peace support operation.

Abstract:
Calls for greater coherence in the international community's support for security sector reform (SSR) have become commonplace. This reflects frustration at the stovepiped contributions that frequently seem to characterise international SSR engagement. Perhaps more damaging, incoherent approaches may only be the visible symptom of a more profound problem – the inability or unwillingness of the international community to engage collectively with complex political dynamics when designing and implementing SSR programmes. The nexus between difficult SSR politics and incoherent SSR support has multiple dimensions. On the one hand, an SSR process may challenge (or reinforce) inequities in power relations that exclude certain groups and interests. Competing interests therefore provide a sub-text to any reform process. On the other hand, SSR assistance from external actors is itself highly political (and is certainly viewed as such by 'recipients'). This tension is reflected in harmful accusations that SSR represents a Trojan horse for the imposition of foreign values and influence. By failing to acknowledge these political sensitivities in SSR policies and programmes, external interventions can at best have a marginal impact on national security dynamics. This Horizon Paper therefore attempts to provide additional clarity to the concept of coherence and its utility in supporting more effective SSR.

Abstract:
Most of today's armed conflicts take place within states and are waged by at least one NSA fighting state forces and/or other NSAs. In these conflicts, frequent violations of humanitarian norms are committed by both state and non-state parties. NSAs also frequently control or heavily influence areas where civilians live. Consequently, efforts to protect civilian populations should address not only the behaviour of states, but also that of NSA.

Abstract:
The open Internet has been a boon for humanity. It has not only allowed scientists, companies and entities of all sorts to become more effective and efficient. It has also enabled an unprecedented exchange of ideas, information, and culture amongst previously unconnected individuals and groups. It has completely revolutionized on a global scale how we do business, interact and communicate.

Abstract:
Private military and security forces, in various forms, have been around for as long as there has been war and insecurity. In the fi rst and second centuries BC, Carthaginians used Numidian mercenaries, in the fifth century the Romans used Germanic mercenaries on their northern borders, the Byzantines hired the Spanish in the fourteenth century, the English used Prussian “Hessians” in the American War of Independence, and the Swiss Guard have been providing protective services to the Vatican since 1506. These forces were used by strong regional and local powers to safeguard or expand territory or other spheres of influence under their control.

Abstract:
Cyber security encompasses borderless challenges, while responses remain overwhelmingly national in scope and even these are insufficient. There are enormous gaps in both our understanding of the issue, as well as in the technical and governance capabilities required to confront it. Furthermore, democratic governance concerns – particularly regarding control, oversight and transparency – have been almost entirely absent from the debate. These concerns are exacerbated by the enormous role played by private actors (both alone and in cooperation with governments) in online security of all types. Given the pace at which states and private companies are reinforcing online security and preparing for cyber war, addressing democratic governance concerns has never been more pressing. They are the primary subject of this paper.

Abstract:
Analysts at Stanford University's Center for International Security and Cooperation (CISAC) together with colleagues at the James Martin Center for Nonproliferation Studies, Monterey Institute of International Studies (MIIS), are playing a leading role in deriving new, timely, and valueâ€added information of global security and earth science relevance from a variety of open-­source geospatial tools that include digital virtual globes like Google Earth together with satellite imagery available from commercial vendors via the internet Cloud. This article provides some discovery exemplars, by CISAC researchers and others, which have only quite recently become possible through the use of such tools.

Topic:
Security, Arms Control and Proliferation, Science and Technology

Abstract:
The relationship between the European Union (EU) and Asia is in flux. The EU intensified its economic ties to Asia and boosted its security cooperation in the region in 2011 and 2012. But new challenges, including the crises in Ukraine and the Middle East, have made it difficult to sustain this incipient momentum. There are a number of steps that EU and Asian governments can and should take to continue to strengthen their relations.

Abstract:
The European defense market, though impacted by lethargic economic growth and painful fiscal austerity measures, continues to be a driver in global defense. Five of the fifteen biggest military spenders worldwide in 2013 were European countries, and Europe remains a major market for international arms production and sales. Surges in military spending by Russia, China, and various Middle Eastern countries in recent years has augmented the defense landscape, especially as European countries in aggregate continue to spend less on defense and the United States embarks on a series of deep-striking budget cuts. This report analyzes overall trends in defense spending, troop numbers, collaboration, and the European defense and security industrial base across 37 countries. To remain consistent with previous reports, this briefing utilizes functional NATO categories (Equipment, Personnel, Operations and Maintenance, Infrastructure, and Research and Development) and reports figures in constant 2013 euros unless otherwise noted. Many of the trends identified within the 2012 CSIS European Defense Trends report continued into 2013, namely reductions in topline defense spending, further cuts to R spending, and steadily declining troop numbers. Though total European defense spending decreased from 2001-2013, with an accelerated decline between 2008 and 2010, select countries increased spending2 between 2011 and 2013. Collaboration among European countries has decreased in the R category; however, it has increased in the equipment category – indicating increased investment in collaborative procurement. Defense expenditure as a percentage of total government expenditure has decreased across Europe from 2001-2013 with the exceptions of Albania and Estonia. An updated CSIS European Security, Defense, and Space (ESDS) Index is included within this report and exhibits a shift in geographic revenue origin for leading European defense firms away from North America and Europe and towards other major markets between 2008 and 2013. Finally, a brief analysis of Russian defense spending is included in the final section of this report in order to comprehend more fully the size and scope of the European defense market within the global framework. In 2013, Russia replaced the United Kingdom as the third largest global defense spender, devoting 11.2 percent of total government expenditures to defense. This briefing report concludes with summarized observations concerning trends in European defense from 2001 to 2013. CSIS will continue to follow and evaluate themes in European defense, which will appear in subsequent briefings.

Abstract:
While the united states has long acknowledged the value of working with partner nations to address shared security concerns, drawdowns in defense spending have underscored the importance of bilateral and multilateral cooperation to leverage capabilities and investments. the Center for strategic and International studies' multiyear Federated Defense Project aims to inform policymakers about global and regional security architectures and defense capabilities that support the achievement of common security goals, as well as ways to improve defense cooperation among nations to address those goals together. This report on institutional foundations of federated defense recognizes that successful cooperation in a budget-constrained environment often rests on the u.s. ability and willing-ness to provide assistance and/or equipment to partner nations. CSIS project staff drew on a literature review, workshops, and a public event (“the Future of the security Cooperation Enterprise”) to identify key findings in five areas: Priorities/Strategic Guidance: Proponents of federated defense should better articulate priorities. A proactive, interagency component that includes, at a minimum, officials from the Defense Department, State Department, and White House is necessary to effect a cultural shift and combat potential backsliding into unilateral approaches. Foreign Military Sales: In a federated approach, officials should identify capabilities that could most effectively support partner nations' contributions to federated defense. Toward that end, officials should also emphasize the establishment and maintenance of high-demand capabilities over time. other key issues related to potential difficulties in foreign sales include surcharges, overhead costs, and transparency in offsets. Export Controls: study participants noted that recent export control reform efforts have not yet resulted in significant change and have inadequately addressed industry concerns. Moreover, there appears to be a lack of appetite for these reforms in Congress. Technology Security and Foreign Disclosure: Improvements are needed to coordinate and speed technology transfer and foreign disclosure decisions. transparency across stovepipes within the executive branch is critical to create a common vision and objectives for federated defense, which is especially important when working with industry and foreign government partners. Acquisition and Requirements Processes: Within the Department of Defense, there is insufficient consideration of the export value and challenges of systems in early stages of the acquisition and requirements processes. Modifications during late stages of development are often far more expensive than building in exportability earlier. Having examined these key areas, the study team identified and analyzed three over-arching institutional challenges to and opportunities for federated defense. First, study participants remarked upon the lack of sufficient advocacy for federated defense among senior U.S. government officials. A second challenge was the cultural resistance to federated defense; experts noted that significant cultural change, such as that brought about by the Goldwater-Nichols Department of Defense Reorganization Act of 1986 (Pub.L. 99-433), may require top-down direction, years to implement, and decades to be accepted. A third challenge was the need for a perceived or actual budget crisis to drive change. The study team's recommendations resulting from this examination were five-fold. First, U.S. national strategies should address the grand strategy questions that could imperil implementation of a federated approach. Implementation of the u.s. National security strategy could impel a new effort to focus on partner capabilities and areas for sharing the common global security burden, as well as to prioritize interests and activities related to U.S. security cooperation, export controls, and technology security/foreign disclosure. Second, proactive U.S. leaders should articulate a vision, objectives, and priorities for a federated approach to defense. third, the Administration and Congress should work together to ensure completion of legal and regulatory reforms already under way (e.g., on export controls). Fourth, executive and legislative officials—perhaps through an interagency task force that works with committee staffs—should identify additional reforms to streamline or create authorities and to eliminate unhelpful directed spending on capabilities and systems that do not contribute to federated defense. Finally, the Department of Defense should start with incremental steps to create a culture that values federated defense; for example, the Defense Acquisition University and Defense Institute of Security Assistance Management could update coursework to institutionalize knowledge regarding federated approaches. This study made it clear that enduring changes in these five areas—from strategy to culture—are necessary to ensure the success of a federated approach to defense.

Institution:
Kolleg-Forschergruppe "The Transformative Power of Europe"

Abstract:
The Joint Africa-EU Strategy (JAES), which was adopted in 2007, aimed to break with the traditional do¬nor-recipient relationship between the EU and Africa and to develop a true partnership. The concept of partnership has been central in EU-Africa relations ever since the Lomé Agreement (1975), but many have argued that it has been eroded by conditionalities and the end of special trade preferences. Ideally, a partnership is characterized by shared values, equality and trust, but are these principles reflected in the JAES? This study investigates this question by focusing on the thematic partnerships on peace and security and democratic governance and human rights. The paper argues that, despite the power asymmetries between the EU and Africa, the JAES has been characterized by equality in decision-making and by African ownership in capacity-building. However, while the JAES may objectively be based on shared values, the EU and the AU have often differed on how to apply those values in concrete situations, more particularly on the question which type of intervention is acceptable (conditionality, military intervention, etc.). Moreover, the analysis identifies a general feeling of mistrust amongst both parties in the partnership.

Abstract:
This paper describes the nature of digital intelligence and provides context for the material published as a result of the actions of National Security Agency (NSA) contractor Edward Snowden. Digital intelligence is presented as enabled by the opportunities of global communications and private sector innovation and as growing in response to changing demands from government and law enforcement, in part mediated through legal, parliamentary and executive regulation. A common set of organizational and ethical norms based on human rights considerations are suggested to govern such modern intelligence activity (both domestic and external) using a three-layer model of security activity on the Internet: securing the use of the Internet for everyday economic and social life; the activity of law enforcement — both nationally and through international agreements — attempting to manage criminal threats exploiting the Internet; and the work of secret intelligence and security agencies using the Internet to gain information on their targets, including in support of law enforcement.

Abstract:
Already-weak states in Libya and Yemen crumbled as struggles for control over their security sectors became central to transitional politics after the popular uprisings of 2011. Instead of being reformed and upgraded to enhance the fragile legitimacy of interim governments, the security sectors collapsed by 2014. Libya and Yemen are now caught in a vicious circle: rebuilding effective central states and cohesive national identities requires a new consensus on the purpose and governance of security sectors, but reaching this agreement depends on resolving the deep political divisions and social fractures that led to civil war in both countries.